A(n) ________ is an image that is configured so that parts of the image can be used as one or more hyperlinks.

a. image map
b. hyperimage
c. navigation image
d. list marker image


a. image map

Computer Science & Information Technology

You might also like to view...

Which of the following is not included in an exception’s stack trace?

a. A descriptive message for the exception. b. The method-call stack at the time the exception occurred. c. The name of the exception. d. Instructions on handling the exception.

Computer Science & Information Technology

Building on Exercise 5, create a monthly budget. Track your actual expenses to see how close you are. Use green for items that are under budget and red for those that are over budget.

What will be an ideal response?

Computer Science & Information Technology

A string of characters used to control access to a network or program is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ is the destruction of hardware, software, or data.

A. Extortion B. Hacking C. Denial of Service D. Sabotage

Computer Science & Information Technology